Skip to main content
Top
Published in: Journal of Business Ethics 3/2021

Open Access 17-06-2019 | Original Paper

Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective

Authors: Weiyin Hong, Frank K. Y. Chan, James Y. L. Thong

Published in: Journal of Business Ethics | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey of 2417 individuals in Hong Kong. The results show that the factors under all four dimensions are significant in the formation of Internet privacy concern. Specifically, familiarity with government legislation, Internet knowledge, benefit of information disclosure, privacy protection, and social presence reduce Internet privacy concern, while individuals’ previous privacy invasion experience, risk avoidance personality, and sensitivity of information requested by websites increase Internet privacy concern. We conducted an analysis of unobserved heterogeneity to confirm the significance of these factors. A follow-up moderation analysis shows that the individual factors (i.e., previous privacy invasion experience, risk avoidance personality, and Internet knowledge) moderate the effects of the information management factor (i.e., information sensitivity) and the interaction management factors (i.e., privacy protection and social presence). The findings provide an integrated understanding of the formation of Internet privacy concern.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
In this paper, the term “antecedents” is used interchangeably with the terms “drivers” and “inhibitors”.
 
2
Protection motivation theory proposes that individuals protect themselves based on their perceptions of: severity of, vulnerability to the threat, response efficacy (i.e., belief that implementing a behavioral response will reduce the threat), and self-efficacy (i.e., belief in one’s ability to perform the behavioral response) (Li 2012).
 
3
Asians are used to high-density living conditions (e.g., small homes, crowded subways, etc.) and are more tolerant of noise and crowding than Westerners (Gillis et al. 1986). Thus, Asians may be more tolerant of being closely observed by others and lower privacy (e.g., Wang and Lau 2013).
 
4
The individual dimension is an extension of the original self-ego dimension in the MDT. This dimension includes, in addition to an individual’s experience, other individual-related factors suggested by Westin (2003), such as individual traits and demographics. Information management and interaction management are related dimensions that describe how an individual manages his or her interpersonal interaction with others.
 
5
We also conducted a focus group discussion with seven Internet users to confirm the relevance of the selected factors.
 
6
In the U.S., some legislations, including the Privacy Act (1974), the Computer Matching and Privacy Act (1988), and the Telecommunications Act (1996), were introduced to restrict the collection, use, and dissemination of personal information. In Europe, the Council of Europe passed stricter rules that protect personal data from both the private and public sectors. In Asia, for example, Hong Kong has implemented privacy laws that are similar to that in Europe.
 
7
We compared the demographics of our sample to the government census data of 2016 on Hong Kong’s population. There was no significant difference in terms of gender (Chi-square, p>0.05), but our sample was relatively younger and more educated, and had lower income than the population average (Chi-square, p<0.05). Nevertheless, our sample was closely representative of the active adult Internet users in Hong Kong, who were aged between 25 and 44. 99% of users in this age group accessed the Internet every day (vs. the global median at 29%) (Statista 2016).
 
8
In the first round of analysis, we controlled for the effects of gender, age, Internet experience, and weekly Internet usage on IPC, and found that none of the control variables was significant. Also, we conducted a series of split-group analyses based on these control variables and did not find any difference across subgroups. Thus, we proceeded to test the model with the main constructs only. Further, to alleviate the concern with common method bias (CMB), we employed the marker variable technique to validate our results. Following Malhotra et al. (2006), we used the smallest positive correlation among the latent constructs (i.e., 0.01) as an estimate of common method bias to produce a CMB-adjusted correlation matrix and re-estimate the path coefficients. The results showed that the CMB-adjusted path coefficients were consistent with those without the CMB adjustment. Hence, CMB was not deemed a threat to our results.
 
Literature
go back to reference Aiken, L. S., & West, S. C. (1991). Multiple regression testing and interpreting interactions. Newbury Park, CA: Sage. Aiken, L. S., & West, S. C. (1991). Multiple regression testing and interpreting interactions. Newbury Park, CA: Sage.
go back to reference Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the Web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350–353. Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the Web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350–353.
go back to reference Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123. Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123.
go back to reference Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28. Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28.
go back to reference Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150.
go back to reference Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21. Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21.
go back to reference Becker, J. M., Rai, A., Ringle, C. M., & Völckner, F. (2013). Discovering unobserved heterogeneity in structural equation models to avert validity threats. MIS Quarterly, 37(3), 665–694. Becker, J. M., Rai, A., Ringle, C. M., & Völckner, F. (2013). Discovering unobserved heterogeneity in structural equation models to avert validity threats. MIS Quarterly, 37(3), 665–694.
go back to reference Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041.
go back to reference Belanger, F., & Crossler, R. E. (2019). Dealing with digital traces: Understanding protective behaviors on mobile devices. Journal of Strategic Information Systems, 28(1), 34–49. Belanger, F., & Crossler, R. E. (2019). Dealing with digital traces: Understanding protective behaviors on mobile devices. Journal of Strategic Information Systems, 28(1), 34–49.
go back to reference Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324. Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324.
go back to reference Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an Antecedents-Privacy Concerns–Outcomes model. Journal of Information Science, 43(5), 583–600. Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an Antecedents-Privacy Concerns–Outcomes model. Journal of Information Science, 43(5), 583–600.
go back to reference Bennett, C. J. (1992). Regulating privacy. Ithaca, NY: Cornell University Press. Bennett, C. J. (1992). Regulating privacy. Ithaca, NY: Cornell University Press.
go back to reference Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44–57. Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44–57.
go back to reference Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7–19. Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7–19.
go back to reference Chen, J. C., Zhang, Y., & Heath, R. (2001). An exploratory investigation of the relationships between consumer characteristics and information privacy. Marketing Management Journal, 11(1), 73–81. Chen, J. C., Zhang, Y., & Heath, R. (2001). An exploratory investigation of the relationships between consumer characteristics and information privacy. Marketing Management Journal, 11(1), 73–81.
go back to reference Choi, Y. K., Miracle, G. E., & Biocca, F. (2001). The effects of anthropomorphic agents on advertising effectiveness and the mediating role of presence. Journal of Interactive Advertising, 2(1), 19–32. Choi, Y. K., Miracle, G. E., & Biocca, F. (2001). The effects of anthropomorphic agents on advertising effectiveness and the mediating role of presence. Journal of Interactive Advertising, 2(1), 19–32.
go back to reference Culnan, M. J. (1993). How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341–363. Culnan, M. J. (1993). How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341–363.
go back to reference Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedure fairness, and impersonal trust: An empirical investigation. Organizational Science, 10(1), 104–115. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedure fairness, and impersonal trust: An empirical investigation. Organizational Science, 10(1), 104–115.
go back to reference Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.
go back to reference Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce – A study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402. Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce – A study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402.
go back to reference Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: Measurement validity and a regression model. Behavior & Information Technology, 23(6), 413–422. Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: Measurement validity and a regression model. Behavior & Information Technology, 23(6), 413–422.
go back to reference Dinev, T. & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29. Dinev, T. & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29.
go back to reference Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.
go back to reference Dinev, T., & Hart, P. (2006b). Privacy concerns and levels of information exchange: An empirical investigation of intended eservices use. eService Journal, 4(3), 25–59. Dinev, T., & Hart, P. (2006b). Privacy concerns and levels of information exchange: An empirical investigation of intended eservices use. eService Journal, 4(3), 25–59.
go back to reference Dinev, T., Xu, H., Smith, H. J., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316. Dinev, T., Xu, H., Smith, H. J., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316.
go back to reference Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online b-to-c relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886. Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online b-to-c relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886.
go back to reference Esposito Vinzi, V., Trinchera, L., Squillacciotti, S., & Tenenhaus, M. (2008). REBUS-PLS: A response-based procedure for detecting unit segments in PLS path modelling. Applied Stochastic Models in Business & Industry, 24(5), 439–458. Esposito Vinzi, V., Trinchera, L., Squillacciotti, S., & Tenenhaus, M. (2008). REBUS-PLS: A response-based procedure for detecting unit segments in PLS path modelling. Applied Stochastic Models in Business & Industry, 24(5), 439–458.
go back to reference Etzioni, A. (2019). Cyber trust. Journal of Business Ethics, 156(1), 1–13. Etzioni, A. (2019). Cyber trust. Journal of Business Ethics, 156(1), 1–13.
go back to reference Flaherty, D. H. (1989). Protecting privacy in surveillance societies. Chapel Hill, NC: University of North Carolina Press. Flaherty, D. H. (1989). Protecting privacy in surveillance societies. Chapel Hill, NC: University of North Carolina Press.
go back to reference Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.
go back to reference Garfinkel, R., Gopal, R., & Thompson, S. (2007). Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information. Information Systems Research, 18(1), 23–41. Garfinkel, R., Gopal, R., & Thompson, S. (2007). Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information. Information Systems Research, 18(1), 23–41.
go back to reference Gillis, A. R., Richard, M. A., & Hagan, J. (1986). Ethnic susceptibility to crowding: An empirical analysis. Environment and Behavior, 18(6), 683–706. Gillis, A. R., Richard, M. A., & Hagan, J. (1986). Ethnic susceptibility to crowding: An empirical analysis. Environment and Behavior, 18(6), 683–706.
go back to reference Goodhue, D. L., Lewis, W., & Thompson, R. (2012). Comparing PLS to regression and LISREL: A response to Marcoulides, Chin, and Saunders. MIS Quarterly, 36(3), 703–716. Goodhue, D. L., Lewis, W., & Thompson, R. (2012). Comparing PLS to regression and LISREL: A response to Marcoulides, Chin, and Saunders. MIS Quarterly, 36(3), 703–716.
go back to reference Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: Consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4/5), 302–318. Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: Consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4/5), 302–318.
go back to reference Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152. Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152.
go back to reference Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111–123. Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111–123.
go back to reference Hann, I. H., Hui, K. L., Lee, S. Y., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13–42. Hann, I. H., Hui, K. L., Lee, S. Y., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13–42.
go back to reference Harris, M. M., Hoye, G. V., & Lievens, F. (2003). Privacy and attitudes towards Internet-based selection systems: A cross-cultural comparison. International Journal of Selection and Assessment, 11(2/3), 230–236. Harris, M. M., Hoye, G. V., & Lievens, F. (2003). Privacy and attitudes towards Internet-based selection systems: A cross-cultural comparison. International Journal of Selection and Assessment, 11(2/3), 230–236.
go back to reference Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2019). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 91–113. Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2019). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 91–113.
go back to reference Hoffman, D. L., Novak, T., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85. Hoffman, D. L., Novak, T., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85.
go back to reference Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: software of the mind. Columbus, OH: McGraw Hill. Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: software of the mind. Columbus, OH: McGraw Hill.
go back to reference Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136. Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136.
go back to reference Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298. Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.
go back to reference Hui, K. L., Tan, B. C. Y., & Goh, C. Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology, 6(4), 415–441. Hui, K. L., Tan, B. C. Y., & Goh, C. Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology, 6(4), 415–441.
go back to reference Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33. Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33.
go back to reference International Data Corporation (IDC). (2017). IDC special report: measuring U.S. Privacy Sentiment (IDC #US42238617). International Data Corporation (IDC). (2017). IDC special report: measuring U.S. Privacy Sentiment (IDC #US42238617).
go back to reference Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579–595. Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579–595.
go back to reference Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402. Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402.
go back to reference Klopfer, P. H., & Rubenstein, D. L. (1977). The concept privacy and its biological basis. Journal of Social Issues, 33(3), 52–65. Klopfer, P. H., & Rubenstein, D. L. (1977). The concept privacy and its biological basis. Journal of Social Issues, 33(3), 52–65.
go back to reference LaRose, R., & Rifon, N. (2006). Your privacy is assured—of being disturbed: Comparing Web Sites with and without privacy seals. New Media and Society, 8(6), 1009–1029. LaRose, R., & Rifon, N. (2006). Your privacy is assured—of being disturbed: Comparing Web Sites with and without privacy seals. New Media and Society, 8(6), 1009–1029.
go back to reference Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional development theory. Journal of Social Issues, 33(3), 22–42. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional development theory. Journal of Social Issues, 33(3), 22–42.
go back to reference Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481. Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481.
go back to reference Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343–354. Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343–354.
go back to reference Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers’ willingness to disclose personal information. Decision Support Systems, 51(3), 434–445. Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers’ willingness to disclose personal information. Decision Support Systems, 51(3), 434–445.
go back to reference Li, X. B., & Sarkar, S. (2006). Privacy protection in data mining: A perturbation approach for categorical data. Information Systems Research, 17(3), 254–270. Li, X. B., & Sarkar, S. (2006). Privacy protection in data mining: A perturbation approach for categorical data. Information Systems Research, 17(3), 254–270.
go back to reference Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern: A privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(1), 289–304. Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern: A privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(1), 289–304.
go back to reference Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200. Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.
go back to reference Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
go back to reference Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865–1883. Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865–1883.
go back to reference Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271. Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271.
go back to reference Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569. Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569.
go back to reference Metzger, M. J., & Docter, S. (2003). Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media, 47(3), 350–374. Metzger, M. J., & Docter, S. (2003). Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media, 47(3), 350–374.
go back to reference Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65–74. Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65–74.
go back to reference Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57. Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
go back to reference Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28(3), 255–265. Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28(3), 255–265.
go back to reference Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1–6. Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1–6.
go back to reference Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206–215. Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206–215.
go back to reference Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125. Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.
go back to reference Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs, 35(1), 27–44. Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs, 35(1), 27–44.
go back to reference Nowak, G., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when ‘privacy’ matters. Journal of Direct Marketing, 11(4), 94–108. Nowak, G., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when ‘privacy’ matters. Journal of Direct Marketing, 11(4), 94–108.
go back to reference Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642–660. Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642–660.
go back to reference Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go?”. MIS Quarterly, 35(4), 977–988. Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go?”. MIS Quarterly, 35(4), 977–988.
go back to reference Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: An agency theory perspective. MIS Quarterly, 31(1), 105–136. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: An agency theory perspective. MIS Quarterly, 31(1), 105–136.
go back to reference Peng, D. X., & Lai, F. (2012). Using partial least squares in operations management research: A practical guideline and summary of past research. Journal of Operations Management, 30(6), 467–480. Peng, D. X., & Lai, F. (2012). Using partial least squares in operations management research: A practical guideline and summary of past research. Journal of Operations Management, 30(6), 467–480.
go back to reference Phelps, J. P., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17. Phelps, J. P., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17.
go back to reference Phelps, J. P., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. Phelps, J. P., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41.
go back to reference Pollach, I. (2005). A typology of communicative strategies in online privacy policies: Ethics, power and informed consent. Journal of Business Ethics, 62(3), 221–235. Pollach, I. (2005). A typology of communicative strategies in online privacy policies: Ethics, power and informed consent. Journal of Business Ethics, 62(3), 221–235.
go back to reference Reinartz, W., Haenlein, M., & Henseler, J. (2009). An empirical comparison of the efficacy of covariance-based and variance-based SEM. International Journal of Research in Marketing, 26(4), 332–344. Reinartz, W., Haenlein, M., & Henseler, J. (2009). An empirical comparison of the efficacy of covariance-based and variance-based SEM. International Journal of Research in Marketing, 26(4), 332–344.
go back to reference Resnick, M. L., & Montania, R. (2003). Perceptions of consumer service, information privacy, and product quality from semiotic design features in an online Web store. International Journal of Human-Computer Interaction, 16(2), 211–234. Resnick, M. L., & Montania, R. (2003). Perceptions of consumer service, information privacy, and product quality from semiotic design features in an online Web store. International Journal of Human-Computer Interaction, 16(2), 211–234.
go back to reference Rice, R. (1993). Using social presence theory to compare traditional and new organizational media. Human Communication Research, 19(4), 451–484. Rice, R. (1993). Using social presence theory to compare traditional and new organizational media. Human Communication Research, 19(4), 451–484.
go back to reference Ringle, C. M., Sarstedt, M., & Straub, D. W. (2012). A critical look at the use of PLS-SEM in MIS Quarterly. MIS Quarterly, 36(1), iii–xiv. Ringle, C. M., Sarstedt, M., & Straub, D. W. (2012). A critical look at the use of PLS-SEM in MIS Quarterly. MIS Quarterly, 36(1), iii–xiv.
go back to reference Rohm, A., & Milne, G. (2004). Just what the doctor ordered: The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000–1011. Rohm, A., & Milne, G. (2004). Just what the doctor ordered: The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000–1011.
go back to reference Rose, E. A. (2006). An examination of the concern for information privacy in the New Zealand regulatory context. Information & Management, 43(3), 322–335. Rose, E. A. (2006). An examination of the concern for information privacy in the New Zealand regulatory context. Information & Management, 43(3), 322–335.
go back to reference Ruiz-Palomino, P., & Martinez-Cañas, R. (2011). Supervisor role modeling, ethics-related organizational policies, and employee ethical intention: The moderating impact of moral ideology. Journal of Business Ethics, 102(4), 653–668. Ruiz-Palomino, P., & Martinez-Cañas, R. (2011). Supervisor role modeling, ethics-related organizational policies, and employee ethical intention: The moderating impact of moral ideology. Journal of Business Ethics, 102(4), 653–668.
go back to reference Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126. Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.
go back to reference Shaw, T. R. (2003). The moral intensity of privacy: An empirical study of webmaster’ attitudes. Journal of Business Ethics, 46(4), 301–318. Shaw, T. R. (2003). The moral intensity of privacy: An empirical study of webmaster’ attitudes. Journal of Business Ethics, 46(4), 301–318.
go back to reference Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. Information Society, 18(1), 21–32. Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. Information Society, 18(1), 21–32.
go back to reference Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73. Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73.
go back to reference Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. London: Wiley. Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. London: Wiley.
go back to reference Singer, E., Mathiowetz, N. A., & Couper, M. P. (1993). The impact of privacy and confidentiality concerns on survey participation: The case of the 1990 US census. Public Opinion Quarterly, 57(4), 465–482. Singer, E., Mathiowetz, N. A., & Couper, M. P. (1993). The impact of privacy and confidentiality concerns on survey participation: The case of the 1990 US census. Public Opinion Quarterly, 57(4), 465–482.
go back to reference Singh, T., & Hill, M. E. (2003). Consumer privacy and the Internet in Europe: A view from Germany. Journal of Consumer Marketing, 20(7), 634–651. Singh, T., & Hill, M. E. (2003). Consumer privacy and the Internet in Europe: A view from Germany. Journal of Consumer Marketing, 20(7), 634–651.
go back to reference Sitkin, S. B., & Weingart, L. R. (1995). Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38(6), 1573–1592. Sitkin, S. B., & Weingart, L. R. (1995). Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38(6), 1573–1592.
go back to reference Smith, H. J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: University of North Carolina Press. Smith, H. J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: University of North Carolina Press.
go back to reference Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.
go back to reference Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
go back to reference Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529. Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529.
go back to reference Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49. Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49.
go back to reference Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8(3), 349–411. Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8(3), 349–411.
go back to reference Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.
go back to reference Turner, E. C., & Dasgupta, S. (2003). Privacy on the Web: An examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management, 20(1), 8–19. Turner, E. C., & Dasgupta, S. (2003). Privacy on the Web: An examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management, 20(1), 8–19.
go back to reference Van Dyke, T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17(1), 68–81. Van Dyke, T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17(1), 68–81.
go back to reference Wang, J., & Lau, S. S. (2013). Hierarchical production of privacy: Gating in compact living in Hong Kong. Current Urban Studies, 1(2), 11–18. Wang, J., & Lau, S. S. (2013). Hierarchical production of privacy: Gating in compact living in Hong Kong. Current Urban Studies, 1(2), 11–18.
go back to reference Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of on-line privacy concerns and willingness to provide personal and financial information. Journal of Marketing Communications, 11(1), 21–40. Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of on-line privacy concerns and willingness to provide personal and financial information. Journal of Marketing Communications, 11(1), 21–40.
go back to reference Warkentin, M., Goel, S., & Menard, P. (2017). Shared benefits and information privacy: What determines smart meter technology adoption? Journal of the Association for Information Systems, 18(11), 758–786. Warkentin, M., Goel, S., & Menard, P. (2017). Shared benefits and information privacy: What determines smart meter technology adoption? Journal of the Association for Information Systems, 18(11), 758–786.
go back to reference Weigel-Garrey, C. J., Cook, C. C., & Brotherson, M. J. (1998). Children and Privacy. Journal of Family Issues, 19(1), 43–64. Weigel-Garrey, C. J., Cook, C. C., & Brotherson, M. J. (1998). Children and Privacy. Journal of Family Issues, 19(1), 43–64.
go back to reference Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453. Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453.
go back to reference Wetzels, M., Odekerken-Schröder, G., & van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177–195. Wetzels, M., Odekerken-Schröder, G., & van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177–195.
go back to reference White, T. B. (2004). Consumer disclosure and disclosure avoidance: A motivational framework. Journal of Consumer Psychology, 14(1/2), 41–51. White, T. B. (2004). Consumer disclosure and disclosure avoidance: A motivational framework. Journal of Consumer Psychology, 14(1/2), 41–51.
go back to reference Wijethilake, C., Munir, R., & Appuhami, R. (2018). Environmental innovation strategy and organizational performance: Enabling and controlling uses of management control systems. Journal of Business Ethics, 151(4), 1139–1160. Wijethilake, C., Munir, R., & Appuhami, R. (2018). Environmental innovation strategy and organizational performance: Enabling and controlling uses of management control systems. Journal of Business Ethics, 151(4), 1139–1160.
go back to reference Xie, E., Teo, H. H., & Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61–74. Xie, E., Teo, H. H., & Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61–74.
go back to reference Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2011a). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 518–546. Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2011a). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 518–546.
go back to reference Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011b). The personalization privacy paradox: A study of privacy decision making process for location-awareness marketing. Decision Support Systems, 51(1), 42–52. Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011b). The personalization privacy paradox: A study of privacy decision making process for location-awareness marketing. Decision Support Systems, 51(1), 42–52.
go back to reference Xu, H. & Teo, H. H. (2004). Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: Proceedings of the 25th international conference on information systems (pp. 793–806). Washington, DC, 2004. Xu, H. & Teo, H. H. (2004). Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: Proceedings of the 25th international conference on information systems (pp. 793–806). Washington, DC, 2004.
go back to reference Xu, H., Teo, H. H., & Tan, B. C. Y. (2005). Predicting the adoption of location-based services: The role of trust and perceived privacy risk. In: Proceedings of the 26th international conference on information systems (pp. 897–910). Las Vegas, NV, 2005. Xu, H., Teo, H. H., & Tan, B. C. Y. (2005). Predicting the adoption of location-based services: The role of trust and perceived privacy risk. In: Proceedings of the 26th international conference on information systems (pp. 897–910). Las Vegas, NV, 2005.
go back to reference Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push–pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 137–176. Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push–pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 137–176.
go back to reference Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342–1363. Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342–1363.
go back to reference Yap, C. S., & Thong, J. Y. L. (1997). Programme evaluation of a government information technology programme for small businesses. Journal of Information Technology, 12(2), 107–120. Yap, C. S., & Thong, J. Y. L. (1997). Programme evaluation of a government information technology programme for small businesses. Journal of Information Technology, 12(2), 107–120.
go back to reference Yap, C. S., Thong, J. Y. L., & Raman, K. S. (1994). Effect of government incentives on computerization in small business. European Journal of Information Systems, 3(3), 191–206. Yap, C. S., Thong, J. Y. L., & Raman, K. S. (1994). Effect of government incentives on computerization in small business. European Journal of Information Systems, 3(3), 191–206.
go back to reference Youn, S. (2005). Teenagers’ perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86–110. Youn, S. (2005). Teenagers’ perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86–110.
go back to reference Zhou, W., & Piramuthu, S. (2015). Information relevance model of customized privacy for IoT. Journal of Business Ethics, 131(1), 19–30. Zhou, W., & Piramuthu, S. (2015). Information relevance model of customized privacy for IoT. Journal of Business Ethics, 131(1), 19–30.
Metadata
Title
Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective
Authors
Weiyin Hong
Frank K. Y. Chan
James Y. L. Thong
Publication date
17-06-2019
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 3/2021
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-019-04237-1

Other articles of this Issue 3/2021

Journal of Business Ethics 3/2021 Go to the issue